Labour Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: geek65

Note! Following JK0-019 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

JK0-019 CompTIA E2C Network + Certification Exam Questions and Answers

Questions 4

A company recently added an addition to their office building. A technician runs new plenum network cables from the switch on one side of the company's gymnasium 80 meters (262 ft.) to the new offices on the other side, draping the wires across the light fixtures. Users working out of the new offices in the addition complain of intermittent network connectivity. Which of the following is MOST likely the cause of the connectivity issue?

Options:

A.

dB loss

B.

Distance

C.

Incorrect connector type

D.

EMI

E.

Crosstalk

Buy Now
Questions 5

Which of the following WAN technologies has the HIGHEST latency?

Options:

A.

ADSL

B.

LTE

C.

Satellite

D.

WiMAX

Buy Now
Questions 6

A firewall that detects and prevents attacks from outside the network based on learned data patterns can BEST be described as which of the following?

Options:

A.

Signature based IDS

B.

Behavior based IPS

C.

Host based IPS

D.

Network based IDS

Buy Now
Questions 7

A user is unable to connect to a remote computer using RDP. The technician checks the firewall rules and notes that there is no rule that blocks RDP. Which of the following features of the firewall is responsible for blocking RDP?

Options:

A.

Stateful inspection

B.

NAT/PAT

C.

Port security

D.

Implicit deny

Buy Now
Questions 8

A technician is terminating a new run of network cables to a 110 block. Which of the following tools would the technician use?

Options:

A.

Loopback plug

B.

Crimper tool

C.

Punch down tool

D.

Cable tester

Buy Now
Questions 9

Which of the following network monitoring resources would be used to analyze possible connectivity issues such as duplex mismatches and uptime statistics?

Options:

A.

Protocol analyzer

B.

Syslog server

C.

Packet sniffer

D.

IPS logs

Buy Now
Questions 10

A new technician has been tasked with implementing a QoS policy for the Network. The technician decides it would be best to monitor the information traversing the network to gain statistical information on ports and protocols utilized. Which of the following tools should the technician use to complete this objective QUICKEST?

Options:

A.

Traffic analyzer

B.

Network sniffer

C.

SNMPv3

D.

System logs

Buy Now
Questions 11

A content filter is MOST likely installed on which of the following servers?

Options:

A.

Proxy server

B.

TACACS+ server

C.

DNS server

D.

DHCP server

Buy Now
Questions 12

A technician is looking to create a new network cable. Which of the following tools would assist in creating and testing a cable properly? (Select TWO).

Options:

A.

Toner probe

B.

Cable certifier

C.

Butt set

D.

Crimper

E.

Network analyzer

Buy Now
Questions 13

An IP camera has a failed PoE NIC. This is the third time in months that a PoE NIC has failed on this device. The technician suspects a possible power issue. Which of the following should be used to test the theory?

Options:

A.

Toner probe

B.

Loopback plug

C.

Protocol analyzer

D.

Multimeter

Buy Now
Questions 14

An administrator is using a packet sniffer to try to determine what is causing the traffic on the network. The administrator sees a lot of packets on port 25. Which of the following traffic types is MOST likely using port 25?

Options:

A.

SMTP

B.

SSH

C.

DNS

D.

TELNET

Buy Now
Questions 15

Which of the following protocols is MOST commonly used for the transfer of router configuration files?

Options:

A.

SSL

B.

TFTP

C.

DNS

D.

IMAP

Buy Now
Questions 16

A company pays a third-party vendor a monthly fee to connect to offsite servers and desktops. Users connect to the desktops via RDP, and administrators connect to the servers via VPN. Servers and desktops are hardware-based. Which of the following is the third-party providing?

Options:

A.

Virtual desktops

B.

Virtual servers

C.

NaaS

D.

SaaS

Buy Now
Questions 17

A multi-layer switch operates at which of the following OSI layers?

Options:

A.

Layers 1 and 5

B.

Layers 2 and 3

C.

Layers 4 and 5

D.

Layers 5 and 6

Buy Now
Questions 18

A technician, Joe, visits a site that has reported a network down emergency. He immediately reboots the switches and the router since the network is down. Which of the following network troubleshooting methodology steps should Joe have performed FIRST?

Options:

A.

Determine if anything has changed

B.

Once a theory is confirmed determine the next step is to resolve the problem

C.

Implement the solution or escalate as necessary

D.

Question the obvious

Buy Now
Questions 19

A network technician is troubleshooting signal problems with certain WAPs in an office and finds consistently high ping times across the units. Such an issue is called which of the following?

Options:

A.

Latency

B.

Attenuation

C.

Crosstalk

D.

Frequency hopping

Buy Now
Questions 20

Which of the following OSI model layers is used to frame packets that are sent over a medium?

Options:

A.

Session

B.

Data link

C.

Physical

D.

Transport

Buy Now
Questions 21

An administrator is able to list the interfaces on a switch after providing the community string "public". Which of the protocols is the administrator MOST likely using?

Options:

A.

Telnet

B.

RADIUS

C.

SSH

D.

SNMP

Buy Now
Questions 22

Which of the following dynamic routing protocols selects routing paths based upon hop count?

Options:

A.

BGP

B.

RIP

C.

OSPF

D.

IGRP

Buy Now
Questions 23

Which of the following OSI model layers are present in the application layer of the TCP/IP model? (Select TWO).

Options:

A.

Data Link

B.

Transport

C.

Network

D.

Session

E.

Presentation

Buy Now
Questions 24

Which of the following protocols occurs at Layer 4 of the OSI model?

Options:

A.

ISDN

B.

IPX

C.

GRE

D.

UDP

Buy Now
Questions 25

Which of the following is a common physical network topology?

Options:

A.

Cross-over

B.

Loopback

C.

Star

D.

Straight

Buy Now
Questions 26

Using source port numbers as a way to keep track of connections is a characteristic of which of the following protocols?

Options:

A.

TCP

B.

UDP

C.

NAT

D.

PAT

Buy Now
Questions 27

A network administrator notices that load balancing is not working properly on the web cluster as previously configured. In speaking with management, a change to the IP addressing scheme was made yesterday which possibly affected one member of the cluster. Due to the timing of the events, the administrator theorizes that this change caused the problem. Which of the following should the administrator do NEXT?

Options:

A.

Escalate to the management team

B.

Change the IP address back to its previous state

C.

Test the theory by analyzing logs

D.

Create a plan of action to present to management

Buy Now
Questions 28

Which of the following addresses is a class B private address?

Options:

A.

132.216.14.184

B.

152.119.25.213

C.

162.17.43.22

D.

172.23.226.34

Buy Now
Questions 29

Which of the following is considered a routing metric?

Options:

A.

Hop count

B.

QoS

C.

Subnet size

D.

IP address

Buy Now
Questions 30

The address 6FFE:FFFF:0000:2F3B:04AC:00FF:FEBE:5C4A is an example of which of the following?

Options:

A.

APIPA

B.

MAC

C.

IPv4

D.

IPv6

Buy Now
Questions 31

Which of the following network protocols is used to transport email across the Internet?

Options:

A.

NTP

B.

SSH

C.

SMTP

D.

SNMP

Buy Now
Questions 32

Which of the following ports is used by Telnet?

Options:

A.

21

B.

23

C.

80

D.

143

Buy Now
Questions 33

203.50.5.0 is an example of which of the following network classes?

Options:

A.

Class A

B.

Class B

C.

Class C

D.

Class D

Buy Now
Questions 34

An administrator needs to provide remote connectivity to server1, web traffic to server2, and FTP access to server3 using a single outside IP address. Which of the following would the administrator implement on the firewall to accomplish this?

Options:

A.

Port Address Translation

B.

Demilitarized Zone

C.

Stateful Packet Inspection

D.

Network Address Translation

Buy Now
Questions 35

Which of the following contains the SYN and ACK flags?

Options:

A.

UDP header

B.

IP header

C.

TCP header

D.

ICMP header

Buy Now
Questions 36

Which of the following allows for groups of ports on the same switch to operate as a part of different segmented networks?

Options:

A.

RIP

B.

STP

C.

VLAN

D.

MTU

Buy Now
Questions 37

A network manager is interested in a device that watches for threats on a network but does not act on its own, and also does not put a strain on client systems. Which of the following would BEST meet these requirements?

Options:

A.

HIDS

B.

NIDS

C.

NIPS

D.

HIPS

Buy Now
Questions 38

A company wants to have a security zone to isolate traffic within the firewall. Which of the following could be used?

Options:

A.

VPN

B.

ACL

C.

DMZ

D.

VLAN

Buy Now
Questions 39

Which of the following would be the BEST solution for an IDS to monitor known attacks?

Options:

A.

Host-based

B.

Signature-based

C.

Network-based

D.

Behavior-based

Buy Now
Questions 40

Which of the following should be mitigated by employing proper coding techniques when developing software?

Options:

A.

Distributed denial of service attacks

B.

Buffer overflows

C.

War driving

D.

Packet sniffing

Buy Now
Questions 41

An unusual amount of activity is coming into one of the switches in an IDF. A malware attack is suspected. Which of the following tools would appropriately diagnose the problem?

Options:

A.

Cable tester

B.

Protocol analyzer

C.

Load balancer

D.

OTDR

Buy Now
Questions 42

Users at a remote site are unable to establish a VPN to the main office. At which of the following layers of the OSI model does the problem MOST likely reside?

Options:

A.

Presentation

B.

Application

C.

Physical

D.

Session

Buy Now
Questions 43

Which of the following attacks would allow an intruder to do port mapping on a company’s internal server from a separate company server on the Internet?

Options:

A.

SYN flood

B.

Teardrop

C.

Smurf

D.

FTP bounce

Buy Now
Questions 44

Which of the following would be used in a firewall to block incoming TCP packets that are not from established connections?

Options:

A.

Access control lists

B.

Port address translation

C.

Blocking unauthorized ports

D.

Stateful inspection

Buy Now
Questions 45

An administrator would like to search for network vulnerabilities on servers, routers, and embedded appliances. Which of the following tools would MOST likely accomplish this?

Options:

A.

Baseline analyzer

B.

Ping

C.

Protocol analyzer

D.

Nessus

Buy Now
Questions 46

Which of the following is the default authentication method for a Windows client using PPP over a dialup connection?

Options:

A.

TACACS+

B.

WINS

C.

Kerberos

D.

MS-CHAP

Buy Now
Questions 47

A user at a hotel sees two SSIDs; both are called "HotelWireless". After the PC connects to one of the APs, the user notices their browser homepage has been changed. Which of the following BEST describes this AP?

Options:

A.

Man-in-the-middle

B.

DDoS

C.

Evil twin

D.

War driving

Buy Now
Questions 48

Which of the following can use a third party back-end LDAP user database for authentication?

Options:

A.

ISAKMP

B.

TACACS+

C.

PKI

D.

CHAP

Buy Now
Questions 49

Which of the following would a network administrator MOST likely use to actively discover unsecure services running on a company’s network?

Options:

A.

IDS

B.

Nessus

C.

NMAP

D.

Firewall

Buy Now
Questions 50

Many of the corporate users work from a coffee shop during their lunch breaks. The coffee shop only has an open wireless network. Which of the following should the administrator recommend to users to secure their wireless communications at the coffee shop?

Options:

A.

Enable the host-based firewall on each of the laptops

B.

Use a VPN after connecting to the coffee shop wireless

C.

Edit the SSID connection information and change 'open' to 'shared'

D.

Connect to the open SSID then switch on WPA2 encryption

Buy Now
Questions 51

A user reports that they are unable to access a new server but are able to access all other network resources. Based on the following firewall rules and network information, which of the following ACL entries is the cause?

User’s IP: 192.168.5.14

Server IP: 192.168.5.17

Firewall rules:

Permit 192.168.5.16/28192.168.5.0/28

Permit 192.168.5.0/24192.168.4.0/24

Permit 192.168.4.0/24192.168.5.0/24

Deny 192.168.5.0/28192.168.5.16/28

Deny 192.168.14.0/24192.168.5.16/28

Deny 192.168.0.0/24192.168.5.0/24

Options:

A.

Deny 192.168.0.0/24192.168.5.0/24

B.

Deny 192.168.5.0/28192.168.5.16/28

C.

Deny 192.168.14.0/24192.168.5.16/28

D.

Implicit Deny rule

Buy Now
Questions 52

Which of the following VPN technologies uses IKE and ISAKMP for key exchange?

Options:

A.

SSL

B.

IPSec

C.

L2TP

D.

PPTP

Buy Now
Questions 53

Ann, a user, connects to her company’s secured wireless network in the conference room when attending meetings. While using the conference room this morning, Ann notices an unsecured wireless network with the same name is available. Ann connects her laptop to this network instead of to the secured one. Ann has fallen victim to which of the following threats?

Options:

A.

Rogue access point

B.

ARP poisoning

C.

Replay attack

D.

Evil twin

Buy Now
Questions 54

A network administrator is considering implementation of network access restrictions based upon layer two addressing information. Which of the following describes this method of network restrictions?

Options:

A.

MAC filtering

B.

Port filtering

C.

IP filtering

D.

ACL filtering

Buy Now
Questions 55

Which of the following wireless router security measures provides access to a network by allowing only devices on an approved physical address list?

Options:

A.

Port filtering

B.

MAC filtering

C.

SSID masking

D.

Port forwarding

Buy Now
Questions 56

Which of the following will BEST block a host from accessing the LAN on a network using static IP addresses?

Options:

A.

IP filtering

B.

Port filtering

C.

MAC address filtering

D.

DHCP lease

Buy Now
Questions 57

A network administrator is implementing an IPS on VLAN 1 and wants the IPS to learn what to prevent on its own. Which of the following would MOST likely be installed?

Options:

A.

Honeynet

B.

Signature based IPS

C.

Behavior based IPS

D.

Host based IPS

Buy Now
Questions 58

A company wants to secure its WAPs from unauthorized access. Which of the following is the MOST secure wireless encryption method?

Options:

A.

SSID disable

B.

SNMPv3

C.

WEP

D.

WPA2

Buy Now
Questions 59

Which of the following TCP/IP model layers does the OSI model Presentation layer map to?

Options:

A.

Transport

B.

Internet

C.

Application

D.

Network Interface

Buy Now
Questions 60

A SOHO client has tasked Joe, a technician, with setting up a basic SOHO network to support four laptops and one desktop PC. The client would also like to have a basic wireless network to use for internal devices only that is secure. Given the list of requirements, which of the following devices would Joe need to purchase for his client? (Select TWO).

Options:

A.

IDS

B.

Repeater

C.

Switch

D.

WAP

E.

UTM device

Buy Now
Questions 61

Which of the following provides secure access to a network device?

Options:

A.

SNMPv2

B.

FTP

C.

RSH

D.

SSH

Buy Now
Questions 62

Which of the following is MOST commonly implemented for remote access to UNIX systems?

Options:

A.

SSL

B.

RSH

C.

SSH

D.

RDP

Buy Now
Questions 63

Which of the following tools would a technician use to determine if a CAT6 cable is properly terminated?

Options:

A.

Cable tester

B.

Punch down tool

C.

Crimper

D.

Multimeter

Buy Now
Questions 64

The day network administrator is having problems on the network and realizes that the night administrator implemented a new device that is causing broadcast traffic. Which of the following should be implemented to avoid miscommunication between the administrators?

Options:

A.

Asset management

B.

System baselines

C.

System logging

D.

Change management

Buy Now
Questions 65

A technician is having trouble identifying a computer on a network. The technician has the IP address of the computer, but needs to find the hostname of the computer. Which of the following commands should the technician use?

Options:

A.

ipconfig /a

B.

ping -t

C.

ping -a

D.

netstat

Buy Now
Questions 66

Which of the following can be used to prioritize network streams to optimize performance for certain traffic types?

Options:

A.

VLAN

B.

VPN

C.

QoS

D.

PoE

Buy Now
Questions 67

An administrator is trying to retrieve management information from the network devices on their LAN. Which of the following monitoring resources provides the ability to collect this information encrypted over the network?

Options:

A.

SNMPv3

B.

VTP

C.

CDP

D.

IPSec

Buy Now
Questions 68

An organization finds that most of the outgoing traffic on the network is directed at several Internet sites viewed by multiple computers simultaneously. Which of the following performance optimization methods would BEST alleviate network traffic?

Options:

A.

Load balancing internal web servers

B.

Redundant network resources

C.

Implement fault tolerance on the WAN

D.

Implement caching engines

Buy Now
Questions 69

A technician has traced a POTS line to a 110 block. Which of the following devices would the technician MOST likely use to see if the line carries a dial tone?

Options:

A.

Toner Probe

B.

Punch Down Tool

C.

Protocol Analyzer

D.

Butt Set

Buy Now
Questions 70

Which of the following tools would a technician use to terminate CAT6 wires to the inside of the wall jack?

Options:

A.

Toner probe

B.

Cable tester

C.

Punch down

D.

Crimper

Buy Now
Questions 71

A computer has lost network connectivity. The network technician determines the network cable and the cable drop are both good. Which of the following would the technician use to test the computer’s NIC?

Options:

A.

Cable certifier

B.

Throughput tester

C.

Loopback plug

D.

Multimeter

Buy Now
Questions 72

A network administrator wants to see what ports are open on a server. Which of the following commands will show open ports?

Options:

A.

netstat

B.

tracert

C.

nbtstat

D.

nslookup

Buy Now
Questions 73

Which of the following tools allows an administrator to identify a cable?

Options:

A.

Multimeter

B.

Cable stripper

C.

Toner

D.

Punch down tool

Buy Now
Questions 74

Joe, a remote user, has called the helpdesk with an issue on his machine. The technician would like to remote into the machine for troubleshooting but does not know the IP address or host name. Which of the following commands can the technician ask Joe to execute to gain this information?

Options:

A.

netstat

B.

ipconfig

C.

ping

D.

traceroute

Buy Now
Questions 75

Users inform an administrator that the network is slow. The administrator notices the bulk of the traffic is SIP and RTP traffic. Which of the following could the administrator do to help BEST alleviate the traffic congestion for the users?

Options:

A.

Create an ACL on the switches and routers that are dropping SIP and RTP packets.

B.

Create a QoS policy prioritizing users over RTP and SIP traffic.

C.

Create another VLAN for SIP and RTP traffic.

D.

Create a rule to throttle SIP and RTP to 10Kbps or less.

Buy Now
Questions 76

A technician is troubleshooting Internet connectivity for a PC. Which of the following is MOST likely the reason for Internet connectivity issues upon inspecting the routing table?

Options:

A.

The router should be listed as 224.0.0.1

B.

The NIC is set to the wrong subnet mask

C.

The route of last resort is missing

D.

Loopback traffic is weighted higher than NIC interface traffic

Buy Now
Questions 77

A technician has been tasked with planning and implementing a new wired-only network for a small office. A hardware list has been compiled, but the technician is unsure about the final necessary item. Which of the following will BEST complete the small wired network setup?

(1) 1000 foot CAT6 spool

(1) crimper

(1) 16 port gigabit switch

(20) RJ-45 connectors

(12) RJ-45 wall jacks

(1) ____________

Options:

A.

Compression tool

B.

Punch down tool

C.

Network map

D.

Multimeter

Buy Now
Questions 78

A network technician is trying to run a protocol analyzer and is instructed to record the chimney offload state of TCP. Which of the following utilities did the technician use to check this parameter with the output listed below?

Querying active state...

TCP Global Parameters

----------------------------------------------

Receive-Side Scaling State : enabled

Chimney Offload State : disabled

Receive Window Auto-Tuning Level : normal

Add-On Congestion Control Provider : ctcp

ECN Capability : disabled

RFC 1323 Timestamps : disabled

Options:

A.

net

B.

netstat

C.

nbtstat

D.

netsh

Buy Now
Questions 79

A network technician is assigned to view websites that a user has visited. Which of the following should the technician review to find this information?

Options:

A.

Event viewer

B.

History logs

C.

Network sniffer

D.

System logs

Buy Now
Questions 80

A company has been just opened a new site in another country. Both sites share information across the WAN continuously throughout the business day. Which of the following should be implemented to ensure both sites are accessible?

Options:

A.

Traffic shaping

B.

QoS

C.

Caching engines

D.

High availability

Buy Now
Questions 81

A Chief Executive Officer (CEO) decided that only a limited number of authorized company workstations will be able to connect to the Internet. Which of the following would BEST accomplish this goal?

Options:

A.

Use content filtering

B.

Install and configure IDS

C.

Enable MAC address filtering

D.

Enable RAS on the network firewall

Buy Now
Questions 82

Which of the following would be considered a Demarc extension?

Options:

A.

A patch cable connecting a cable modem with a wireless router

B.

Patch panel wiring

C.

Punch down block wiring

D.

Copper wire connecting the main PSTN point of entry to a wall data outlet

Buy Now
Questions 83

Which of the following technologies can cause interference for 802.11g?

Options:

A.

RADAR

B.

802.11a

C.

IrDA

D.

Bluetooth

Buy Now
Questions 84

Which of the following 802.11 standards transmits the signals the GREATEST distance?

Options:

A.

a

B.

b

C.

g

D.

n

Buy Now
Questions 85

A technician has been called about intermittent connectivity near IDF 2. Multiple cables were recently pulled through a common conduit. Which of the following is MOST likely the cause of the problem?

Options:

A.

Crosstalk

B.

Bad connectors

C.

Wrong DNS

D.

Duplicate IP address

Buy Now
Questions 86

Which of the following cables would BEST be used to extend a network through an 80 feet (262 meters) machine shop that has many high voltage machines and generators running?

Options:

A.

CAT5

B.

CAT6

C.

Coaxial

D.

Fiber

Buy Now
Questions 87

An administrator has added four switches to a campus network. The switch in wiring closet A is only connected to the switch in wiring closet C. The switch in wiring closet B is connected to the switch in wiring closet C as well as wiring closet D. The switch in wiring closet D is only connected to the switch in wiring closet B. Which of the following topologies is represented in this design?

Options:

A.

Ring

B.

Star

C.

Bus

D.

Mesh

Buy Now
Questions 88

Which of the following wireless standards provide speed of 11Mbps?

Options:

A.

802.11a

B.

802.11b

C.

802.11g

D.

802.11n

Buy Now
Questions 89

Which of the following is a common connector used on a coaxial cable?

Options:

A.

RJ-45

B.

DB-25

C.

BNC

D.

LC

Buy Now
Questions 90

Which of the following technologies allows multiple staff members to connect back to a centralized office?

Options:

A.

Peer to Peer

B.

VPN

C.

PKI

D.

VLAN

Buy Now
Questions 91

A technician is tasked with replacing some older RS-232 serial printers. Which of the following ports would the technician most likely find on these printers?

Options:

A.

BNC

B.

DB-9

C.

LC

D.

RJ-11

Buy Now
Questions 92

A technician is assigned the task of connecting two buildings 125 meters apart (410 ft.). Which of the following cable types should the technician consider?

Options:

A.

CAT5e Cable

B.

CAT5 Cable

C.

Plenum

D.

Single mode fiber

Buy Now
Questions 93

While preparing to replace an old CAT3 cable with a CAT6 cable to implement VoIP, a facilities employee mistakenly disconnects the entire patch panel, including valid wiring to live workstations. Which of the following should an administrator use in order to connect those ports FIRST?

Options:

A.

Toner

B.

Multimeter

C.

Reflectometer

D.

Cable tester

Buy Now
Questions 94

A technician is troubleshooting a problem where data packets are being corrupted. Which of the following connectivity problems should the technician check?

Options:

A.

Attenuation

B.

Latency

C.

Crosstalk

D.

External interference

Buy Now
Questions 95

A network administrator needs to ensure there is no same channel interference for an 802.11n deployment with four WAPs. Which of the following channel setting configurations meets this criteria when using 40 MHz channels?

Options:

A.

36, 40, 44, 48

B.

36, 44, 52, 60

C.

36, 44, 48, 52

D.

36, 48, 60, 64

Buy Now
Questions 96

Which of the following defines the pinout of an 8P8C eight pin modular jack for a CAT6a cable?

Options:

A.

568B

B.

RJ-11

C.

RJ-45

D.

RS-232

Buy Now
Questions 97

Which of the following connector types is MOST commonly used for serial connections?

Options:

A.

MTRJ

B.

RJ-11

C.

RS-232

D.

RJ-45

Buy Now
Questions 98

A user would like to connect two laptops together and transfer files via the Ethernet ports. Which of the following should MOST likely be provided to the user to accomplish this?

Options:

A.

Crossover

B.

Rollover

C.

Loopback

D.

Straight cable

Buy Now
Questions 99

The network technician is troubleshooting a connectivity issue on a CAT5 cable with a wire map and notices that only pins 1, 3, and 6 are mapping correctly. Which of the following pins are open and keeping traffic from flowing correctly?

Options:

A.

2

B.

4

C.

5

D.

8

Buy Now
Questions 100

Which of the following characteristics allows an 802.11g WAP to have transfer speeds up to 108Mbps?

Options:

A.

MIMO technology

B.

Channel bonding

C.

Encryption type

D.

Frequency

Buy Now
Questions 101

A technician needs to restrict access to a SOHO wireless network to specific devices. Which of the following would MOST likely be used with minimal client configuration?

Options:

A.

Port filtering

B.

WEP

C.

MAC address filtering

D.

PoE

Buy Now
Questions 102

A company has recently allowed its employees to telecommute two days a week. The employees MUST have a minimum of 1Mbps non-shared connection to the Internet. Which of the following MUST the employees have at their home in order to connect to the Internet?

Options:

A.

ISDN

B.

Cable modem

C.

DSL

D.

Dial-up networking

Buy Now
Questions 103

Joe, a vendor, walks into a customer’s site with a laptop. While waiting for his contact to arrive, he wants to check his email. He discovers the SSID for the site’s wireless network and receives a valid guest password from the receptionist. He is, however, unable to connect. Which of the following is MOST likely the problem?

Options:

A.

The customer’s wireless router uses WPA encryption.

B.

The wireless router at the customer’s site is configured with MAC filtering.

C.

The customer’s WAP uses WEP encryption.

D.

The customer’s IT department blocks all visitors from connecting to their network.

Buy Now
Questions 104

Which of the following is the BEST way to prevent new users from connecting to a wireless access point, but still allow already connected users to continue to connect?

Options:

A.

Create a MAC filter containing the current users.

B.

Turn off SSID broadcast.

C.

Change the encryption type to AES 256-bit for current users.

D.

Reduce the signal strength to 0 percent.

Buy Now
Questions 105

A customer's email server is not sending emails. Arrange the troubleshooting steps in the order the technician should perform them:

Options:

Buy Now
Questions 106

A network administrator is tasked with deploying a company-wide wireless system which allows for accurate tracking of employees’ wireless device locations via WAP triangulation. Which of the following is the MOST important aspect of the deployment?

Options:

A.

WAP placement

B.

TX/RX channel

C.

Signal strength

D.

Transmission power

Buy Now
Questions 107

A user calls the helpdesk to report not being able to access network resources over the company’s Wi-Fi connection. During information gathering, the user mentions that the wireless network their computer is signed into is not the same name as it had been previously. Which of the following is the underlying cause?

Options:

A.

SSID mismatch

B.

Incorrect WPA key

C.

Signal bounce

D.

Antenna placement

Buy Now
Questions 108

A network technician is setting up a wireless access point that would only allow a certain laptop to be able to access the WAP. By using ACL, which of the following would be filtered to ensure only the authorized laptop can access the WAP?

Options:

A.

NetBIOS name filtering

B.

IP address filtering

C.

MAC address filtering

D.

Computer name filtering

Buy Now
Questions 109

Workstations are unable to access the internet after a recent power outage. Configure the appropriate devices to ensure All workstations have internet connectivity.

Options:

Buy Now
Questions 110

Ann, a technician, is installing network cables for an office building. Some of the cables are not showing active on the switch even when moved to different ports. Which of the following is MOST likely the cause?

Options:

A.

Port speed mismatch

B.

Faulty F-connectors

C.

Bad wiring

D.

Bad switch

Buy Now
Questions 111

An IP address assigned from a DHCP server is said to be which of the following?

Options:

A.

Hybrid

B.

Dynamic

C.

Secure

D.

Static

Buy Now
Questions 112

An administrator has created several virtual machines on the same host server and requires them to each be on separate VLANs. Which of the following should the administrator configure to meet this goal?

Options:

A.

Set the VLAN preferences on the host's NIC

B.

Create each VLAN on the host's virtual switch

C.

Change the virtual machine NIC settings from private to bridged

D.

Create each VLAN on the host's gateway router

Buy Now
Questions 113

Linking two or more switches together so that they can share VLAN information is known as which of the following?

Options:

A.

Port replicating

B.

Filtering

C.

Trunking

D.

Spoofing

Buy Now
Questions 114

A new technician has moved the wireless access point from the middle of the office to an area near a corner office. Wireless users are MOST likely to experience issues with which of the following?

Options:

A.

Signal strength

B.

SSID mismatch

C.

Channel mismatch

D.

Encryption mismatch

Buy Now
Questions 115

A stateful point to point wireless connection going down for a few hours at a time is MOST likely due to which of the following?

Options:

A.

Interference

B.

Configuration

C.

Incorrect MTU size

D.

Incorrect IP

Buy Now
Questions 116

A client has just leased a new office space in a busy commercial building and would like to install a wireless network. Several other tenants are on the same floor. Multiple wireless networks are present in the building. Which of the following can be changed on the client’s wireless network to help ensure that interference from other wireless networks is at a minimum?

Options:

A.

WPA encryption key selection

B.

Channel selection

C.

Antenna types

D.

Disable SSID

Buy Now
Questions 117

Which of the following wireless parameters may need to be modified when a new cordless telephone is installed?

Options:

A.

Encryption type

B.

SSID

C.

IP address

D.

Channel

Buy Now
Questions 118

A network has a large number of users who connect for short periods of time and the network needs to maximize the number of devices that can be configured using DHCP. Which of the following should be configured to solve this issue?

Options:

A.

Increase the number of reservations

B.

Increase exclude list

C.

Decrease lease times

D.

Decrease the scope

Buy Now
Questions 119

Several users are reporting that they are unable to connect to the network. After further investigation, the network administrator notices that a newly configured Layer 2 device lost its configuration. Which of the following MOST likely caused the issue?

Options:

A.

Wrong default gateway

B.

Wrong DNS

C.

Switching loop

D.

Power failure

Buy Now
Questions 120

Which of the following is the reason why a company’s network may contain a DHCP server?

Options:

A.

To assign IP addresses to devices on the network

B.

To convert IP addresses to fully qualified domain names

C.

To provide POP3 and IMAP email functionality

D.

To allow secure remote access

Buy Now
Questions 121

A network technician needs to configure a port on a switch to provide connectivity and electrical support to a WAP being installed in a warehouse. Which of the following features needs to be configured on the switch?

Options:

A.

STP

B.

PoE

C.

VTP trunking

D.

Port forwarding

Buy Now
Questions 122

Which of the following is the difference between 802.11b and 802.11g?

Options:

A.

Distance

B.

Frequency

C.

Speed

D.

Transmission power

Buy Now
Questions 123

After deploying a network switch, the network administrator is unable to remotely administer the device. The network administrator notices that the switch has the following configuration. Which of the following is the MOST likely cause of this issue?

Management LAN: 192.168.10.0/24

Management interfacE. 192.168.10.2 255.255.255.0

Default gateway: 192.168.11.1

STP is enabled

Options:

A.

VLAN assignment

B.

Wrong subnet mask

C.

Switching loop

D.

Wrong gateway

Buy Now
Questions 124

During business hours, users at a small office are reporting that all of a sudden they are unable to reach any host on the Internet, but they can still use the network shares to transfer files within the office. Which of the following is the MOST likely cause of the outage?

Options:

A.

Wrong gateway

B.

Failed router

C.

Bad switch module

D.

Incorrect VLAN

Buy Now
Exam Code: JK0-019
Exam Name: CompTIA E2C Network + Certification Exam
Last Update: Apr 14, 2023
Questions: 828